Query for Crypto Junkies

[chan] general
Aug 8 09:53

I am looking for the heaviest, most memory and processor intensive secure encryption algorithms available. I need: Symmmetric key ciphers Assymmetric keypair ciphers Digital signature schemes Key exchange schemes Secure message digests Additional algorithms and ECC curves that will install to GPG and OpenSSL. preferably in libraries that have an optional command-line interface. new, novel, or unique is ok. Please advise me. I want to try different things for a secret project.

[chan] Crypto-Anarchist Federation
Aug 10 07:00

use OTP, it cannot be broken

Aug 10 10:18

The problems are not crypto, but as Snowden said, the problem is having a secure end-point, which don't exist yet with current computers architectures. Have a look at the work we are doing for BitMessage software, we created a Secure End-Point with open-hardware and open-core (FPGA based Free Integrated Circuits) that will correct all known major security / anonymity issues : https://blogs.mediapart.fr/stman/blog/090717/snowdens-dream-bitmessage-secure-station-open-hardware-open-core-project https://blogs.mediapart.fr/stman/blog/090717/torvpn-fingerprinting-family-anonymity-breach-fix-custom-fpga-based-ic By the way, I have to rephrase a little bit those two articles. Some problems solved are missing in them. For example, we are going to include a custom made RNG in the second FPGA used as a firewall/proxy between the two Raspberry Pi. Regards,

[chan] Crypto-Anarchist Federation
Aug 10 10:20

True. But you can't exchange keys over a wire. And you need lots of big keys.

[chan] Crypto-Anarchist Federation
Aug 10 10:23

"Use OTP" is the common refrain of those who've never tried to actually use it. The fact is it's only useful for short, occasional messages like you'd receive if you were, say, a Soviet spy.

[chan] Crypto-Anarchist Federation
Aug 10 10:23

This sounds great! What is Stman short for?

[chan] Crypto-Anarchist Federation
Aug 10 10:24

What if there was a way to blindly construct identical one time pads without key exchange?

Aug 10 10:25

ATARI ST and MAN gives STMAN Old school electronician and low level programming hacker :-)

[chan] Crypto-Anarchist Federation
Aug 10 10:27

luvz old ataris. In the USA the department stores now sell clones of the original atari gaming consoles. Can you believe that? My first computer was a Tandy CoCo. There was no operating system. To make it do anything you have to program it in BASIC.

[chan] Crypto-Anarchist Federation
Aug 10 11:15

That's a contradiction in itself: OTP only works with random numbers, but if you can construct anything, it cannot be random. OTP with pseudorandom numbers is probably even worse than using a bad cypher.

[chan] Crypto-Anarchist Federation
Aug 10 13:35

we have been using it for many years, never had any trouble

[chan] Crypto-Anarchist Federation
Aug 10 13:46

you mean something like rule30. would that be safe enough?

[chan] Crypto-Anarchist Federation
Aug 10 14:46

(((rule30))) what is this rule30, komerade?

[chan] Crypto-Anarchist Federation
Aug 10 15:08

not by itself. if one used rule 30 on a branching set of binary fields and the material after -n branchings was used as key material, yes. this method would force the computer to fill up memory, making the key generator a memory-hard function with high latency. brute forcing it would be futile. After initial key generation, each communication would exchange another encoded set of branching rules to generate the keys for the next exchange. This would provide forward secrecy. It would also cause increasing noise in each new set of keys. When Bob gets a message from Alice the parameters for further branching the field two steps are encoded in the message. Bob then branches the field to create 3 keys. The third key is the encryption key for the next exchange. The second key is a throwaway key. The first key encrypts the return message and its encoded parameters. Recipient has parameters for this already. The throwaway key is used to encrypt the return message again. Alice already has parameters for this. The third key is included in the payload, and re-encrypted with the throwaway key once more. Alic unwraps with her throwaway key, gets the third key, from which she'll branch and create new parameters. Then she unwraps the rest. Return trip begins with third key Alice just obtained. Since Bob has the third key he knows the next two parameter sets for branching into the next two keys. This time Alice sets the branching parameters from #3, and return message contains it all for Bob to unwrap. this is every bit as secure as OTP, like you would have to unwind every fractal in the universe to decipher it.

[chan] Crypto-Anarchist Federation
Aug 11 08:32

LMGTFY: https://en.wikipedia.org/wiki/Rule_30

[chan] Crypto-Anarchist Federation
Aug 11 10:38

thank you for providing these details.

[chan] Crypto-Anarchist Federation
Aug 11 21:29

(((LMGTFY))) what is this, komerade?

[chan] Crypto-Anarchist Federation
Aug 12 01:21

https://lmgtfy.com/?q=lmgtfy Such meta.

[chan] Crypto-Anarchist Federation
Aug 12 01:37

So when you introduce a concept to conversation that most people in the room would not be familiar with, you expect them to research it instead of providing a short explanation? I see.

[chan] Crypto-Anarchist Federation
Aug 13 16:49

i expect intelligent people taking part in such discussions to do their own research.

[chan] Crypto-Anarchist Federation
Aug 14 08:37

+1 We have not time to loose teaching people 1+1=2. Fascists nazi CIA feds love playing stupid people to make us loose our time.

[chan] Crypto-Anarchist Federation

Subject Last Count
cast: CHANBOT Response Oct 17 17:47 4
help: CHANBOT Response Oct 17 09:26 3
OTP talk by Frank Rieger at 19c3 (mp3/mp4) Oct 17 08:36 1
new chanbot 'cast' command Oct 16 19:15 1
VPN & Firefox (+ other Gecko browsers)* rev. 0.3.10 Oct 16 14:55 1
OMEGA release 38 is available for download Oct 16 10:10 1
Tribler Makes BitTorrent Impossible to Shut Down Oct 16 09:43 1
Your privacy - VPN & Firefox (+ other Gecko browsers)* rev. 0.3.9 Oct 15 09:18 1
Message by Julian Assange. Oct 10 05:31 1
Thougths about Crypto-Anarchism, and the Cyber-Space paradox with the meat space. Oct 9 15:18 1
Message to Julian Assange Oct 8 21:09 3
They can knock all of my TORs down, I won't say a word Oct 8 20:21 2
Message to a friend, with copy for Julian Assange Oct 8 17:22 1
most secure darknet Oct 6 13:01 2
i2p anonymity can be compromised by controlling only 2% of the network. Oct 6 05:54 3
Rogue NSA-controlled Tor nodes Oct 5 17:26 1
Steganography against security Oct 5 17:22 1
One of the most important papers of contemporary cryptohraphy. Oct 5 17:11 1
twister micro blogging Oct 4 18:28 26
One of the most important papers of contemporary cryptology Oct 4 15:09 1
crypto currencies Oct 4 03:15 14
OMEGA release 37 is available for download Oct 3 23:01 1
Unique non-mainstream non-political-correct cryptographic source code Oct 3 19:44 2
World's Most Secure OS now FOSS Sep 30 23:45 1
Gang Stalking & NWO - The begining Sep 30 15:36 1
addon to pyBM : otp crypter -- soon to be integrated into BM for extra safety ! Sep 29 09:56 2
Best? Sep 29 08:13 5
How long have you been using BM? Sep 29 07:23 6
tor browser sandbox 0.0.20 r48240 Sep 29 02:17 1
Feature Mashup Sep 29 02:02 10
Your privacy - VPN & Firefox (+ other Gecko browsers)* rev. 0.3.7 Sep 28 00:21 2
WHATSAPP ENCRYPTION <<<<<<<<<<< Sep 27 23:44 5
shadowchat vs. BM comparison Sep 27 00:32 2
Improving Stateless Hash-Based Signatures Sep 25 13:11 1
UPDATED : Rewarded help needed for scanning old amazon (Or any other website) shipment barcodes (Reward 10€ in Bitcoin per scan). Sep 24 14:41 1
Just like Christmas - Old Windows source code + KAV8 source code Sep 24 13:46 1
NATO member Turkey boast that Russian S-400 SAMs can take out American B-52s, F-22s and Tomahawks Sep 24 08:07 2
BitText LIST Sep 21 12:33 1
bit text Sep 21 12:31 1
tor bridges Sep 21 09:42 2
gram: CHANBOT Response Sep 20 21:25 5
oops: CHANBOT Response Sep 20 19:19 3